|
Conferences in DBLP
- Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:3-12 [Conf]
- Vincent Berk, George Bakos, Robert Morris
Designing a Framework for Active Worm Detection on Global Networks. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:13-24 [Conf]
- Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:25-36 [Conf]
- Cedric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin
Computational Complexity of the Network Routing Logical Security Assessment Process. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:37-48 [Conf]
- Volker Hammer
IT Design Critieria for Damage Reduction. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:49-62 [Conf]
- Nicholas Athanasiades, Randal Abler, John G. Levine, Henry L. Owen, George F. Riley
Intrusion Detection Testing and Benchmarking Methodologies. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:63-72 [Conf]
- Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:73-88 [Conf]
- Tim Gibson
A Guard Architecture for Improved Coalition Operations. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:89-94 [Conf]
- Fujita Tomonori, Ogawara Masanori
Protecting the Integrity of an Entire File System. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:95-108 [Conf]
- John R. James, Frank Mabry
Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:109-112 [Conf]
|